Sciweavers

199 search results - page 40 / 40
» Developing an Immunity to Spam
Sort
View
WISEC
2010
ACM
13 years 4 months ago
Preventing multi-query attack in location-based services
Despite increasing popularity, Location-based Services (LBS) (e.g., searching nearby points-of-interest on map) on mobile handheld devices have been subject to major privacy conce...
Nilothpal Talukder, Sheikh Iqbal Ahamed
BMCBI
2011
12 years 10 months ago
Combinatorial analysis and algorithms for quasispecies reconstruction using next-generation sequencing
Background: Next-generation sequencing (NGS) offers a unique opportunity for high-throughput genomics and has potential to replace Sanger sequencing in many fields, including de-n...
Mattia C. F. Prosperi, Luciano Prosperi, Alessandr...
IACR
2011
207views more  IACR 2011»
12 years 6 months ago
Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Tw
Abstract—In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart ...
Swapnoneel Roy, Amlan K. Das, Yu Li
BMCBI
2006
89views more  BMCBI 2006»
13 years 7 months ago
SPODOBASE : an EST database for the lepidopteran crop pest Spodoptera
Background: The Lepidoptera Spodoptera frugiperda is a pest which causes widespread economic damage on a variety of crop plants. It is also well known through its famous Sf9 cell ...
Vincent Nègre, Thierry Hotelier, Anne-Natha...